Subscribe to RSS Feed (Opens in New Window)
2018 | ||
Thursday, August 16th | ||
12:00 AM |
A Conceptual Model to Understand Privacy Concerns in a Social P2P Payment App Mohsen M. Jozani, The University of Texas at San Antonio 12:00 AM |
|
---|---|---|
12:00 AM |
A Framework for Creating Secure and Memorable Passwords Martha McNeil, Dakota State University 12:00 AM |
|
12:00 AM |
Iqbal Amiri, University of Maryland University College 12:00 AM |
|
12:00 AM |
Assessing Fraud Risks in IT Security Randi Jiang, Louisiana Tech University 12:00 AM |
|
12:00 AM |
Behind Cyber Doors: Securing the Internet of Self Alaa Nehme, Iowa State University 12:00 AM |
|
12:00 AM |
Martin (Dae Youp) Kang, University of Memphis 12:00 AM |
|
12:00 AM |
Blame Distribution Following Information Security Breaches Andrew Miller, Mississippi State University 12:00 AM |
|
12:00 AM |
C-R-P-M-I: A framework to model cyber risk from phishing and mitigation through insurance Arunabha Mukhopadhyay, IIM Lucknow 12:00 AM |
|
12:00 AM |
Can an Ego Defense Mechanism Model Help Explain Dysfunctional IS Security Behavior? Abhijit Chaudhury, Bryant University 12:00 AM |
|
12:00 AM |
Can IoT Devices Be Trusted? An Exploratory Study Donald Privitera, Kennesaw State University 12:00 AM |
|
12:00 AM |
Communicating Compliance: Developing a GDPR Privacy Label Grace Fox, Irish Centre for Cloud Computing and Commerce, Dublin City University 12:00 AM |
|
12:00 AM |
Cyber Risk Quantification and Mitigation Framework for Healthcare using Machine Learning Shounak Pal, Indian Institute of Management Lucknow 12:00 AM |
|
12:00 AM |
Cyberbullying: Investigating the Roles of Power and Communication Medium Zahra Aivazpour, university of texas at san antonio 12:00 AM |
|
12:00 AM |
David Harborth, Goethe University Frankfurt am Main 12:00 AM |
|
12:00 AM |
Exploring the Impact of Information Security Practices on Competitive Advantage Dejan Kosutic, Grenoble Ecole de Management 12:00 AM |
|
12:00 AM |
Shounak Pal, Indian Institute of Management Lucknow 12:00 AM |
|
12:00 AM |
How Do You Cope: Individuals’ Responses to Identity Theft Victimization Yuan Li, University of Illinois at Springfield 12:00 AM |
|
12:00 AM |
Improving Security Message Adherence through Improved Comprehension: Neural and Behavioral Insights Bonnie Anderson, Brigham Young University 12:00 AM |
|
12:00 AM |
Intelligent Home Assistant Use in the Home Environment Robert E. Crossler, Washington State University 12:00 AM |
|
12:00 AM |
Investigating Privacy Concerns of Internet of Things (IoT) Users Philip Menard, University of South Alabama 12:00 AM |
|
12:00 AM |
Investigating User Disclosure of Sensitive Information: An Extended ELM Theory Kelvin King-Kizito, UTRGV 12:00 AM |
|
12:00 AM |
Iterating the Cybernetic Loops in Anti-Phishing Behavior: A Theoretical Integration Alaa Nehme, Iowa State University 12:00 AM |
|
12:00 AM |
Mobile Applications Security: Role of Privacy Hamid Reza Nikkhah, University of Arkansas 12:00 AM |
|
12:00 AM |
Moral and Subjective Norms: How do they Effect Information Security Compliance? Punit Ahluwalia, University of Texas Rio Grande Valley 12:00 AM |
|
12:00 AM |
Organizations’ Proactive Information Security Behavior Fereshteh Ghahramani, University of Texas at Arlington 12:00 AM |
|
12:00 AM |
Predicting Security Events in Cloud Computing Vivek Singh, Information Systems Decision Sciences, MUMA College of Business, University of South Florida 12:00 AM |
|
12:00 AM |
Privacy by Design to Comply with GDPR: A Review on Third-Party Data Processors Christian Kurtz, University of Hamburg 12:00 AM |
|
12:00 AM |
Privacy Negotiation Mechanism in Internet of Things Environments Fagner Roger Pereira Couto, Federal University of São Carlos 12:00 AM |
|
12:00 AM |
PRIVACY, SECURITY AND LEGISLATIVE ACTIONS RELATED TO DRONE USAGE Beverly Medlin, Appalachian State University 12:00 AM |
|
12:00 AM |
Resource-based Perspective on Slack and Data Breach Qian WANG, The Hong Kong Polytechnic University 12:00 AM |
|
12:00 AM |
RisCC – A Risk Management Tool for Cloud Computing Environments Michael Adelmeyer, Osnabrueck University 12:00 AM |
|
12:00 AM |
Kelvin King-Kizito, UTRGV 12:00 AM |
|
12:00 AM |
Satisfying Secure Load Balancing Expectations in the Cloud Brian Cusack, AUT University 12:00 AM |
|
12:00 AM |
Security Related Information Sharing among Firms: Potential Theoretical Explanations Radha Appan, Cleveland State University 12:00 AM |
|
12:00 AM |
Security Violation Prevention; CPTED in the context of information Security Sahar Farshadkhah, Louisiana Tech University 12:00 AM |
|
12:00 AM |
Spillover of Information Security Incidents’ Impact: The Moderating Role of Social Networks and IT Joonghee Lee, Auburn University 12:00 AM |
|
12:00 AM |
The Business Value of Engaging in Counter-Breach Initiatives Taha Havakhor, Oklahoma State University 12:00 AM |
|
12:00 AM |
The Effect of Values on Hacker Participation Volume in Online Communities Ruby Booth, University of Memphis 12:00 AM |
|
12:00 AM |
Alex Zarifis, University of Mannheim, Germany 12:00 AM |
|
12:00 AM |
Obi Ogbanufe, University of North Texas 12:00 AM |
|
12:00 AM |
The Misunderstood Link: Information Security Training Strategy Henry G Torres, Arkansas State University 12:00 AM |
|
12:00 AM |
Keiona Davis, Nova Southeastern University 12:00 AM |
|
12:00 AM |
Using Cognitive Dissonance Theory to Explain Information Security Policy Violations Nasim Talebi, University of Texas at San Antonio 12:00 AM |
|
12:00 AM |
Vulnerability and Risk Assessment of XEN Hypervisor Alan Litchfield, Auckland University of Technology 12:00 AM |